I 0610026377
I 0610026377
I 0610026377
--------------------------------------------------------ABSTRACT-----------------------------------------------------------
Computer networks have become extremely important in our present-day society. A majority of companies
depend on the proper functioning of their networks for communications, administration, automation, e-business
solutions, etc. The Local Area Network (LAN) is the most basic and important computer network owned by
individual companies and could be used for interconnection with wide area networks. A LAN permits effective
cost sharing of high-value data processing equipment such as mass storage media, mainframe computers or
minicomputers, and high-speed printers. Resource sharing is probably equally as important where a LAN
serves as the access vehicle for an intranet or the Internet. In view of this, system managers need professional
tools to help them with the design and maintenance of LANs. A simulation tool offers a way to predict the
impact on the network of a hardware upgrade, a change in topology, an increase in traffic load or the use of a
new application. So in this paper, a LAN network is designed using Cisco Packet Tracer. The paper describes
how the tool can be used to develop a simulation model of the LAN for the College of Engineering of the
University of Agriculture, Makurdi, Nigeria. The study provides an insight into various concepts such as
topology design, IP address configuration and how to send information in form of packets in a single network
and the use of Virtual Local Area Networks (VLANs) to separate the traffic generated by different departments.
Keywords: Computer Networks, IP Addresses, Ping Test, Simulation Tool, Subnetting, VLANs
------------------------------------------------------------------------------------------------------------------------------------------------------
Date of Submission: 06-10-2017 Date of Publication: 27-10-2017
------------------------------------------------------------------------------------------------------------------------------------------
I. INTRODUCTION
The need for computer networking was borne out of the need to use personal computers for sharing
information within an organization in form of messages, sharing files and data bases and so forth. Whether the
organization is located in one building or spread over a large campus, the need for networking the computers
cannot be over emphasized. As the name implies, a Local Area Network (LAN) interconnects computers in a
limited geographic area. It provides high-bandwidth communication over inexpensive transmission media [1].
The corporate LAN has evolved from a passive background business component to a highly active, visible core
asset that enterprises rely on to support day-to-day operations critical to their market success. Today’s network is
a strategic instrument that must be accessible anytime from anywhere-simultaneously offering fast, secure,
reliable services at scale regardless of location [2]. The main purpose of a network is to reduce isolated users and
workgroups. All systems should be capable of communicating with others and should provide desired
information. Additionally, physical systems and devices should be able to maintain and provide satisfactory
performance, reliability and security. Resource sharing is probably equally of immense importance where a LAN
serves as the access vehicle for an intranet or the Internet [2]. In view of this, system managers need professional
tools to help them with the design and maintenance of LANs [3]. A simulation tool offers a way to predict the
impact on the network of a hardware upgrade, a change in topology, an increase in traffic load or the use of a
new application. So in this paper, a LAN network is designed using Cisco Packet Tracer.
Cisco Packet Tracer (CPT) is a multi-tasking network simulation software that can be used to perform
and analyze various network activities such as implementation of different topologies, selection of optimum path
based on various routing algorithms, creation of appropriate servers, subnetting, and analysis of various network
configuration and troubleshooting commands [4]. In order to start communication between end user devices and
to design a network, we need to select appropriate networking devices like routers, switches, hubs and make
physical connection by connecting cables to serial and fast Ethernet ports from the component list of packet
tracer [4]. Networking devices are costly so it is better to perform first on packet tracer to understand the concept
and behavior of the network [4].
The paper describes how the CPT tool can be used to develop a simulation model of the LAN for the
College of Engineering of the University of Agriculture, Makurdi, Nigeria. The study provides an insight into
various concepts such as topology design, IP address configuration and how to send information in form of
packet in a single network and the use of Virtual Local Area Networks (VLANs) to separate the traffic generated
by the different departments. VLANs are a new type of LAN architecture using intelligent, high-speed switches
[5]. The simulation results and performance analyses showed that the design was successful.
The rest of the paper is organized as follows: Section 2 discusses the different LAN topologies. This is
followed by a discussion in section 3 on the different types of transmission media. VLANs are discussed in
section 4. The concept of IPv4 addressing and subnetting is presented in section 5. In section 6, the development
of the LAN simulation model is presented; while section 7 presents the model’s simulation and results analyses.
Lastly in section 8 is the conclusion.
(STP) and Unshielded Twisted Pair (UTP). To define industry-standard pinouts and color coding for twisted-
pair cabling, the TIA/EIA-568 (Telecommunication Industry Association/Electronic Industries Alliance)
standard was developed. The first iteration of the TIA/EIA-568 standard has come to be known as the TIA/EIA-
568-A standard, which was released in 1991. In 2001, an updated standard was released, which became known
as TIA/EIA-568-B. The pinout of these two standards is the same however, the color coding of the wiring is
different. Table 1 shows the TIA/EIA-568 standard.
Three types of cabling exist for UTP cable and they are: Straight through cable, Cross over cable and
Roll over cable. The straight through cable is used to connect either a host to a switch or hub or to connect a
router to a switch or hub. The Cross over cable can be used to connect a switch to switch, hub to a hub, host to
host, hub to switch and a router direct to host. Roll over cables are not used to connect any Ethernet devices
together, rather, they are used to connect a host to a router console serial communication (com) port.
3.4 Wireless
Not all media is physical, as is the case with wireless technologies. Wireless clients gain access to a
wired network by communicating via radio waves with a wireless access point (AP). The access point is then
hardwired to a LAN. All wireless devices connecting to the same AP are considered to be on the same shared
network segment, which means that only one device can send data to and receive data from an AP at any one
time (half duplex communication).
Figure 1: Types of VLAN design (a) single switch VLAN (b) multiswitch VLAN
IP addresses can be dynamically configured using DHCP or they can be statically configured by inputting it
manually on the device [8].
5.3 Subnetting
Subnetting is the process of stealing bits from the host part of an IP address in order to divide the larger
network into smaller sub-networks called subnets [8]. After subnetting, network subnet host fields are created.
An IP address is always reserved to identify the subnet and another one to identify the broadcast address within
the subnet. Subnetting can be done in three basic ways, one of which is subnetting based on the number of sub-
networks you wish to obtain from a single block of IP address; another way is to subnet based on the number of
host computers or devices you want to be connected to that sub-network and finally subnetting by reverse
engineering which is a scenario in which a subnet mask and an IP address block is given and the number of sub-
networks and number of hosts per each subnet are found [8]. For example, if a public IP address block of
192.168.23.1 with a subnet mask of 255.255.255.252 is purchased from our ISP and because this block has only
two valid hosts, this IP address is used to assign to our Router interface so that traffic can be directed from our
network to the ISP and from there to the internet. A private IP address block is then chosen to carry out IP
addressing within our network. Because of the expected clients on this network, a Class B address is chosen for
the internal network and it is 172.168.0.0 with a mask of 255.255.0.0. Based on the power of 2s, there are some
equations that allow us to determine the required details, and these are [8]:
(1)
(2)
(3)
Therefore the number of unmasked bits in the subnet mask is 8 which also implies that the number of
masked bits is 8 i.e. x = 8; hence the new subnet mask is represented in binary as
11111111.11111111.11111111.00000000 which is 255.255.255.0 in decimal and the number of subnets that can
be obtained using this scheme is 2x = number of subnets
Number of subnets = 28 = 256 subnets, block size= 256 – 255 = 1. Therefore the subnets obtained are given
in tabular form in Table 4.
Each serial number entry in the table represents a subnet and this goes on till the number reaches 256
which is the total number of subnets that were obtained. Each of those entries is assigned to a department in the
College of Engineering and some of the remaining blocks are assigned to the Library, New Auditorium and the
Old Auditorium respectively. If any block is unassigned it will be kept for future expansion of the network. The
assignment of the subnets to the units is as follows:
Figure 2: Complete diagram of the college of engineering local area network as created in packet tracer
environment
The diagram of Fig. 2 is the complete diagram of the Local Area Network and at the core it consists of
the router, switch and servers forming the Network Operating Centre (NOC) and all the departments in the
College are just a mere extension of this network at the core. The IP address chosen for the internal network is
172.168.0.0 and it has been subnetted to obtain IP address blocks that are assigned to the different departments
and sections of this LAN.
6.2 Trunk-to-Router
To create a trunk port on the switch that will connect to the router, and all other access ports, we login to the
switch and using the command Line interface (CLI), use the following commands.
Switch(config)#vlan [id].
To create the VLAN for Electrical Engineering Department and also give it an appropriate name for easy
identification, we give the following commands:
Switch(config)#vlan 10
Switch(config-vlan)#name Electrical
We use the two commands above repeatedly to create VLANs for the other departments, each VLAN with its
own ID and name.
The first command is used to select the switch port to assign to the VLAN. The “interface type” in the
command can be a gigabitethernet or fastethernet port, and the “interface identifier” can be 0/1, 0/2,…0/n for the
first, second or up to the nth port on the switch. In the second command, “vlan id” is the ID of the VLAN the port
is to be a part of. To assign port 2 and 3 to the electrical VLAN, we apply the commands:
Switch(config)#interface fastethernet0/2
Switch(config-if)#switchport access vlan 10
Switch(config-if)#interface fastethernet0/3
Switch(config-if)#switchport access vlan 10
The reason for assigning two ports to one VLAN is for redundancy.
Where “ip address” in the command, is the IP address for the interface connecting the VLAN to the Router.
Hence, for VLAN 10 (Electrical Engineering), the command is entered as:
sub-interfaces are created on the router interface connecting to the trunk port on the switch. This can be done by
giving the command below:
Where: “interface type” is either a gigabitethernet port or a fastethernet port and “interface identifier break”
starts the creation of the sub-interfaces e.g. 0/1.1 to create the first sub-interface. The set of commands below
configures the router sub-interfaces, enables DHCP relay, also it implements NAT and finally inter-VLAN
routing.
Admin_router#configure terminal
Admin_router(config)# interface gig0/1
Admin_router(config-if)#no ip address
Admin_router(config-if)#duplex auto
Admin_router(config-if)#speed auto
Admin_router(config-if)#interface gig0/1.1
Admin_router(config-subif)#description VLAN10_interface
Admin_router(config-subif)#encapsulation dot1q 10
Admin_router(config-subif)#ip address 172.168.0.1 255.255.255.0
Admin_router(config-subif)#ip nat inside
Admin_router(config-subif)#ip helper-address 172.168.4.3
Admin_router(config-subif)#end
These commands are applied repeatedly, having in the mind the ID for the different VLANs and the IP address
to the VLAN.
After entering all these information on the prompt, click on the add button for each VLAN entry to add
the pool to the DHCP server. Some IP addresses are excluded to give room for expansion or the connection of
network equipment that will require manual IP assignment. VLAN 80 is the VLAN for the network operating
centre. That is why the maximum number of users on it is less. This is due to the exclusion of more IP addresses
to be assigned to the equipment in the centre.
Router>enable
Router#configure terminal
Router(config)#enable secret group8
Router(config)#service password-encryption
Router(config)#end
Router#write memory
From the above configurations, the password for the router is set to group 8 and password encryption is
enabled using the “service password-encryption” command and the commands are saved to memory. The same
procedure is followed to apply the same commands to the switch.
Router(config)#line vty 0 4
Router(config-line)#password group8
Router(config-line)#login
Router(config-line)#end
Router(config)#line console 0
Router(config-line)#password group8
Router(config-line)#login
Where group8 is the password set up for both the telnet (vty) and console port connections.
Router(config)#hostname Admin_router
Admin_router(config)#ip domain-name engcomplex.com
Admin_router(config)#crypto key generate rsa general-key modulus 1024
Admin_router(config)#ip ssh authentication-retries 3
Admin_router(config)#line vty 0 1180
Admin_router(config)#transport input ssh telnet
The modulus of 1024 indicates the strength of the rsa key to be generated.
Admin_router(config)#aaa new-model
Admin_router(config)#tacacs-server host 172.168.4.1 key secret
Admin_router(config)#aaa authentication login ACCESS group tacacs+
Admin_router(config)#line console 0
Admin_router(config-line)#login authentication ACCESS
Admin_router(config-line)#end
Admin_router#write memory
Fig. 3 shows the created VLANs running on the switch, their ID and switch ports associated to each
VLAN. Fig. 4 shows the results after the configuration of the DHCP server, showing the address pools for each
VLAN created on the Network
A dynamic address configuration was done on the network, i.e. when a client device connects to the network; it
is offered an IP address that is available in that network address pool, that the client is connected to. Fig. 5 shows
client devices successfully obtaining an IP address that is appropriate to the VLAN the devices are connected to.
From Fig. 5, it is shown that each client connected to the network is obtaining IP address information
dynamically, according to the subnet the client is connected to.
From Fig. 6, it is observed that the network is performing well, this is because when we compared the
ping test of the network designed to the ping test on the existing network of College of Engineering, University
of Agriculture, Makurdi, the values were similar. Fig. 7 shows the ping test on the live network in existence.
Using ping to test to confirm that our DNS configuration is working properly, the domain name
engcomplex.com was pinged in one of the PC and observed if it translated the domain name to a valid IP
address. Fig. 8 shows the result of the test.
From Fig. 8, it is observed that the domain name engcomplex.com gets translated to 172,168.4.3 which is the
address of the web server hosting the website.
From the results, it is seen that the mail server set up on the network is working properly.
VIII. CONCLUSION
In this paper, a Local Area Network (LAN) that uses both wired and wireless topology have been
implemented with some important concepts like DHCP, DNS, Email, VLANs in a single network using Cisco
DOI: 10.9790/1813-0610026377 www.theijes.com Page 76
Design and Simulation of Local Area Network Using Cisco Packet Tracer
Packet Tracer. VLANs have been used to logically group clients on the network, and with the aid of a router and
switch configurations, data packets routed from one device to another. It is also noteworthy that, the
configuration and specifications are for the initial prototype and can further be developed and additional
functionality can be added to increase support and coverage. The procedures provide a veritable approach for
the design of LANs for end-to-end IP network connectivity for next generation network (NGN) architecture
implementations.
REFERENCES
[1]. Tim Reardon, Planning, Designing and operating local area networks, DISAM Journal, Summer, 1997.
[2]. www.wikipedia.org/wiki/computer_networks, Retrieved 10th October, 2016.
[3]. www.wikipedia.org/wiki/local_area_network, Retrieved 10th October, 2016.
[4]. Garima Jain, Nasreen Noorani, Nisha Kiran, Sourabh Sharma, Designing & simulation of topology network using Packet Tracer,
International Research Journal of Engineering and Technology (IRJET), 2(2), 2015.
[5]. Alan Dennis, Networking in the Internet age (John Wiley & Sons, 2002).
[6]. Kenan Xu, Performance analysis of differentiated QoS MAC in wireless local area networks (WLANs), Thesis Submitted to the
Department of Electrical and Computer Engineering, Queen’s University, Canada. September, 2003.
[7]. David D. C., Kenneth T.P., David P.R, An introduction to local area networks, Proc. of the IEEE conf., Vol. 66, 1978.
[8]. Todd Lammle, Cisco Certified network associate study guide (Wiley Publishing Inc., 2007).
BIOGRAPHIES
Nathaniel S. Tarkaa is presently a lecturer in the Department of Electrical and Electronics Engineering at the
Federal University of Agriculture, Makurdi, Nigeria. He also worked with NITEL, Nigeria’s national telecom
company for 19 years. He joined the University since 2009. He holds M.Sc. in Electronics and Communications
Engineering and is presently a PhD student in the Department of Electronic Engineering at the University of
Nigeria, Nsukka. His research interests are in all areas of communications engineering.
Paul I. Iannah is a graduating student from the Department of Electrical and Electronics Engineering of the
Federal University of Agriculture, Makurdi, Nigeria. He did a B.Eng. degree programme. His research interests
are in communications engineering.
Isaac T. Iber is a graduating student from the Department of Electrical and Electronics Engineering of the
Federal University of Agriculture, Makurdi, Nigeria. He did a B.Eng. degree programme. His research interests
are in communications engineering.